Across
- 4. Concerning ransomware, a user or organization's critical data is made inaccessible
- 5. Acts performed by individuals with harmful intent, whose goal is to steal data, cause damage to or disrupt computing systems
- 7. Month of CAM
- 9. Compromised digital devices, such as computers, smartphones, tablets, and even entire networks
- 10. Process to restore data that has been lost, accidentally deleted, corrupted or made inaccessible.
- 11. Any staff member who maintains security controls on behalf of an Owner
- 14. Pertaining to a strong password, used to reduce vulnerability in the event of a hack
- 15. TEAMS channel for up to date security notices
- 16. Any person using Catalyst computing resource who are responsible for familiarizing themselves with and complying with Catalyst security policies and procedures
- 18. Lead agency of IC3
- 19. Number of years Catalyst has been a CAM Champ
Down
- 1. One of two useful Security Awareness TEAMS channels
- 2. Any staff member who oversees data recovery
- 3. Leader of a business unit with responsibility for implementing department level operating procedures
- 6. Person(s) responsible for ensuring that security policies are in place and for delegating security related responsibilities to ensure compliance
- 8. Member of management or delegate who has primary responsibility for the business function supported by a system, application
- 12. Minimizing the harm of a particular risk
- 13. A kind of software used to prevent, scan, detect and delete viruses from a computer
- 17. A malicious practice that aims to deceive and defraud people through texts
